Analysis
-
max time kernel
211s -
max time network
174s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
10-05-2020 00:14
Static task
static1
Behavioral task
behavioral1
Sample
Client-17.exe
Resource
win7v200430
General
-
Target
Client-17.exe
-
Size
60KB
-
MD5
0f27d1180d28e1bcaf4d66f6b51c087c
-
SHA1
15a00d3aba362aade900374b6d159de98e8eac62
-
SHA256
34b93f1989b272866f023c34a2243978565fcfd23869cacc58ce592c1c545d8e
-
SHA512
7a6f8f1f55fbd37124fdf24ce057f8cb2231ecc2fc4cf9d9028ab83436e64ae59af97a5e4ec1e6587ebcdfe6487f6794450ba961429afba0b24bd6fb48237ea8
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_MY_FILES_NOT_MAKE_PUBLIC.txt
hakbit
bc1q5dn3tc67wh90mrq65xm8a2z9lr9t0tc2lctwv3
Extracted
Protocol: ftp- Host:
199.188.200.253 - Port:
21 - Username:
[email protected] - Password:
13MelisaLening37
Signatures
-
Hakbit
Ransomware which encrypts files using AES, first seen in November 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Client-17.exedescription ioc process File created C:\Users\Admin\Pictures\SwitchPing.png.crypted Client-17.exe File created C:\Users\Admin\Pictures\LimitRepair.raw.crypted Client-17.exe File created C:\Users\Admin\Pictures\UnlockInstall.tiff.crypted Client-17.exe File opened for modification C:\Users\Admin\Pictures\UnlockInstall.tiff Client-17.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exedescription ioc process File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Client-17.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wallpaper.bmp" Client-17.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 968 1008 WerFault.exe Client-17.exe -
Interacts with shadow copies 2 TTPs 14 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid process 1540 vssadmin.exe 1800 vssadmin.exe 1508 vssadmin.exe 1248 vssadmin.exe 1152 vssadmin.exe 792 vssadmin.exe 1240 vssadmin.exe 1580 vssadmin.exe 908 vssadmin.exe 1512 vssadmin.exe 740 vssadmin.exe 1704 vssadmin.exe 1780 vssadmin.exe 1860 vssadmin.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 1432 taskkill.exe 1936 taskkill.exe 2008 taskkill.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 2012 notepad.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 968 WerFault.exe 968 WerFault.exe 968 WerFault.exe 968 WerFault.exe 968 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
Client-17.exetaskkill.exetaskkill.exetaskkill.exevssvc.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1008 Client-17.exe Token: SeDebugPrivilege 1432 taskkill.exe Token: SeDebugPrivilege 1936 taskkill.exe Token: SeDebugPrivilege 2008 taskkill.exe Token: SeBackupPrivilege 384 vssvc.exe Token: SeRestorePrivilege 384 vssvc.exe Token: SeAuditPrivilege 384 vssvc.exe Token: SeDebugPrivilege 968 WerFault.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Client-17.exenotepad.exepid process 1008 Client-17.exe 2012 notepad.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Client-17.exepid process 1008 Client-17.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Client-17.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1008 wrote to memory of 1412 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1412 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1412 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1412 1008 Client-17.exe net.exe PID 1412 wrote to memory of 384 1412 net.exe net1.exe PID 1412 wrote to memory of 384 1412 net.exe net1.exe PID 1412 wrote to memory of 384 1412 net.exe net1.exe PID 1412 wrote to memory of 384 1412 net.exe net1.exe PID 1008 wrote to memory of 1460 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1460 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1460 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1460 1008 Client-17.exe net.exe PID 1460 wrote to memory of 1572 1460 net.exe net1.exe PID 1460 wrote to memory of 1572 1460 net.exe net1.exe PID 1460 wrote to memory of 1572 1460 net.exe net1.exe PID 1460 wrote to memory of 1572 1460 net.exe net1.exe PID 1008 wrote to memory of 276 1008 Client-17.exe net.exe PID 1008 wrote to memory of 276 1008 Client-17.exe net.exe PID 1008 wrote to memory of 276 1008 Client-17.exe net.exe PID 1008 wrote to memory of 276 1008 Client-17.exe net.exe PID 276 wrote to memory of 544 276 net.exe net1.exe PID 276 wrote to memory of 544 276 net.exe net1.exe PID 276 wrote to memory of 544 276 net.exe net1.exe PID 276 wrote to memory of 544 276 net.exe net1.exe PID 1008 wrote to memory of 780 1008 Client-17.exe net.exe PID 1008 wrote to memory of 780 1008 Client-17.exe net.exe PID 1008 wrote to memory of 780 1008 Client-17.exe net.exe PID 1008 wrote to memory of 780 1008 Client-17.exe net.exe PID 780 wrote to memory of 740 780 net.exe net1.exe PID 780 wrote to memory of 740 780 net.exe net1.exe PID 780 wrote to memory of 740 780 net.exe net1.exe PID 780 wrote to memory of 740 780 net.exe net1.exe PID 1008 wrote to memory of 1132 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1132 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1132 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1132 1008 Client-17.exe net.exe PID 1132 wrote to memory of 1112 1132 net.exe net1.exe PID 1132 wrote to memory of 1112 1132 net.exe net1.exe PID 1132 wrote to memory of 1112 1132 net.exe net1.exe PID 1132 wrote to memory of 1112 1132 net.exe net1.exe PID 1008 wrote to memory of 1544 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1544 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1544 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1544 1008 Client-17.exe net.exe PID 1544 wrote to memory of 1512 1544 net.exe net1.exe PID 1544 wrote to memory of 1512 1544 net.exe net1.exe PID 1544 wrote to memory of 1512 1544 net.exe net1.exe PID 1544 wrote to memory of 1512 1544 net.exe net1.exe PID 1008 wrote to memory of 1696 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1696 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1696 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1696 1008 Client-17.exe net.exe PID 1696 wrote to memory of 1384 1696 net.exe net1.exe PID 1696 wrote to memory of 1384 1696 net.exe net1.exe PID 1696 wrote to memory of 1384 1696 net.exe net1.exe PID 1696 wrote to memory of 1384 1696 net.exe net1.exe PID 1008 wrote to memory of 1292 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1292 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1292 1008 Client-17.exe net.exe PID 1008 wrote to memory of 1292 1008 Client-17.exe net.exe PID 1292 wrote to memory of 1824 1292 net.exe net1.exe PID 1292 wrote to memory of 1824 1292 net.exe net1.exe PID 1292 wrote to memory of 1824 1292 net.exe net1.exe PID 1292 wrote to memory of 1824 1292 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-17.exe"C:\Users\Admin\AppData\Local\Temp\Client-17.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"net.exe" stop avpsus /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop avpsus /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeDLPAgentService /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfewc /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfewc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BMR Boot Service /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop DefWatch /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DefWatch /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ccEvtMgr /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ccEvtMgr /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ccSetMgr /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ccSetMgr /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SavRoam /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SavRoam /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop RTVscan /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RTVscan /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBFCService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBFCService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBIDPService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBIDPService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Intuit.QuickBooks.FCS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBCFMonitorService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop YooBackup /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop YooBackup /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop YooIT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop YooIT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop zhudongfangyu /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop stc_raw_agent /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VSNAPVSS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamTransportSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploymentService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamNFSSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop veeam /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop veeam /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop PDVFSService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecVSSProvider /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentAccelerator /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentBrowser /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecDiveciMediaService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDiveciMediaService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecJobEngine /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecManagementService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecRPCService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcrSch2Svc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcronisAgent /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop CASAD2DWebSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CASAD2DWebSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop CAARCUpdateSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CAARCUpdateSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sophos /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophos /y3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLWriter start= disabled2⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SstpSvc start= disabled2⤵
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\HELP_ME_MY_FILES_NOT_MAKE_PUBLIC.txt2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 14762⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\HELP_ME_MY_FILES_NOT_MAKE_PUBLIC.txtMD5
1a8e52a24541153ab587b3af0833392f
SHA1f08187f065d2d89c3edf5b1a426a3aecde63fc81
SHA256d914f1e873c3224847e5db2ae437eaf69451354e74fc67daa24512ddc3a42939
SHA512c552cb2355ac68d84418b4dc8285695cf7ab9ca13c151409f146929d892de918bc4433d826bae60f0fd2b806f3472125b60eb8055079a0c29a6171e47970b55b
-
memory/968-3-0x00000000021D0000-0x00000000021E1000-memory.dmpFilesize
68KB
-
memory/968-4-0x00000000027A0000-0x00000000027B1000-memory.dmpFilesize
68KB
-
memory/1008-1-0x0000000000000000-0x0000000000000000-disk.dmp